Intelligence
Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

Last week, I wrote about cybersecurity issues raised by the loss of physical control in the U.S. Capitol during the occupation. Since then, it has become clear that a number of devices are missing and presumably taken by the occupiers. The rioters took laptops from the offices of House Speaker Nancy Pelosi and Sen. Jeff Merkley. These devices are now in the physical possession of people who can be considered adversarial threat actors, and those actors now have the opportunity to take their time in trying to penetrate them and see what data is available on those machines.

Read the rest at Lawfare blog

All News button
1
Subtitle

Inside the U.S. Capitol last week, laptops from the offices of House Speaker Nancy Pelosi and Sen. Jeff Merkley, and other devices were taken, presumably by the occupiers. These devices are now in the physical possession of people who can be considered adversarial threat actors, who can take their time in trying to see what data is available on those machines.

Authors
Tom Temin
David Relman
News Type
News
Date
Paragraphs

A National Academies panel commissioned by the State Department shed new light on a disturbing and still mysterious episode. Employees in the Cuban embassy reported headaches, pressure, nausea, strange piercing noises, and cognitive problems seeming to emanate from a directed source. Commerce Department employees in China also had similar experiences. Dr. David Relman discusses some of what hampered the investigation.

Listen to the interview at Federal News Network

All News button
1
Subtitle

A National Academies panel commissioned by the State Department shed new light on a disturbing and still mysterious episode. Employees in the Cuban embassy reported headaches, pressure, nausea, strange piercing noises, and cognitive problems seeming to emanate from a directed source. Commerce Department employees in China also had similar experiences.

Authors
Amy Zegart
News Type
News
Date
Paragraphs

The recently revealed SolarWinds hack unfolded like a scene from a horror movie: Victims frantically barricaded the doors, only to discover that the enemy had been hiding inside the house the whole time. For months, intruders have been roaming wild inside the nation’s government networks, nearly all of the Fortune 500, and thousands of other companies and organizations. The breach—believed to be the work of an elite Russian spy agency—penetrated the Pentagon, nuclear labs, the State Department, the Department of Homeland Security (DHS), and other offices that used network-monitoring software made by Texas-based SolarWinds. America’s intelligence agencies and cyberwarriors never detected a problem. Instead, the breach was caught by the cybersecurity firm FireEye, which itself was a victim.

Read the rest at The Atlantic

All News button
1
Subtitle

Because all countries engage in espionage, intrusions like Russia’s latest data hack are devilishly hard to deter.

0
Former Research Scholar, Stanford Internet Observatory
riana.jpg

Riana Pfefferkorn was a Research Scholar at the Stanford Internet Observatory. She investigated the U.S. and other governments' policies and practices for forcing decryption and/or influencing the security design of online platforms and services, devices, and products, both via technical means and through the courts and legislatures. Riana also studies novel forms of electronic surveillance and data access by U.S. law enforcement and their impact on civil liberties. 

Previously, Riana was the Associate Director of Surveillance and Cybersecurity at the Stanford Center for Internet and Society, where she remains an affiliate. Prior to joining Stanford, she was an associate in the Internet Strategy & Litigation group at the law firm of Wilson Sonsini Goodrich & Rosati, and a law clerk to the Honorable Bruce J. McGiverin of the U.S. District Court for the District of Puerto Rico. During law school, she interned for the Honorable Stephen Reinhardt of the U.S. Court of Appeals for the Ninth Circuit.

Riana has spoken at various legal and security conferences, including Black Hat and DEF CON's Crypto & Privacy Village. She is frequently quoted in the press, including the New York Times, the Washington Post, and NPR. Riana is a graduate of the University of Washington School of Law and Whitman College.

Complete list of publications and recent blog posts here.

Date Label
Authors
Amy Zegart
News Type
Commentary
Date
Paragraphs

Foreign election interference must be bad if spy agencies are making public service announcements. Two weeks ago, Director of National Intelligence (DNI) John Ratcliffe and FBI Director Christopher Wray held a press conference warning that Russia and Iran have been acquiring voter registration data and waging influence operations to sow division and tilt the election. And earlier in October, counterintelligence chief William Evanina and General Paul Nakasone—who heads both the Pentagon’s cyberwarriors and the supersnoopers of the National Security Agency—participated in a video alert designed to reassure Americans that the threats are real but they are on the job.

Read the rest at Foreign Affairs

All News button
1
Subtitle

Spy agencies need to reach voters and tech leaders now, too. Foreign election interference must be bad if spy agencies are making public service announcements.

Authors
Henry Farrell
Amy Zegart
News Type
Q&As
Date
Paragraphs

John Ratcliffe, the director of national intelligence, announced that the intelligence community would cut back on its briefings to Congress on electoral security. Amy B. Zegart, the author of three books on U.S. intelligence, including “Eyes on Spies: Congress and the United States Intelligence Community,” the standard book on the relationship between Congress and intelligence agencies, explains what the decision meant.

Read the rest at Washington Post

All News button
1
Subtitle

John Ratcliffe, the director of national intelligence, announced that the intelligence community would cut back on its briefings to Congress on electoral security. Amy B. Zegart explains what the decision meant.

Authors
Kathryn Stoner
News Type
News
Date
Paragraphs

The findings show the Trump Campaign's interactions with Russian intelligence agencies posed what they're calling a "grave" threat to U.S. counterintelligence. For more, KCBS Radio news anchors Dan Mitchinson and Margie Shafer spoke with Kathryn Stoner, Deputy Director of the Freeman Spogli Institute for International Studies at Stanford specializing in Russian politics.

Listen to KCBS Radio

Hero Image
All News button
1
Subtitle

The findings show the Trump Campaign's interactions with Russian intelligence agencies posed what they're calling a "grave" threat to U.S. counterintelligence. For more, KCBS Radio news anchors Dan Mitchinson and Margie Shafer spoke with Kathryn Stoner, Deputy Director of the Freeman Spogli Institute for International Studies at Stanford specializing in Russian politics.

Authors
Noa Ronkin
News Type
News
Date
Paragraphs

In 2008, the U.S. National Intelligence Council (NIC) published the fourth installment in its effort to identify “megatrends” likely to shape world events a decade or more into the future. Shorenstein APARC Fellow and China expert Thomas Fingar, the then chairman of the NIC, oversaw that report, Global Trends 2025. The unclassified report uses scenarios to illustrate some of the ways in which the factors driving world events – from climate change to demographic decline to changing geopolitical powers – may interact to generate challenges and opportunities for future decisionmakers. One of these scenarios is the emergence of a global pandemic that bears a chilling resemblance to COVID-19.

We sat down with Fingar for an online conversation about the NIC report and its pandemic scenario, the government action it spurred, the United States’ failed initial response to the COVID-19 outbreak, and the implications of the current crisis for U.S.-China relations. Watch:

Twelve years after its publication, the NIC’s "Potential Emergence of a Global Pandemic" scenario (p. 75) has proven to be woefully accurate:

“The emergence of a novel, highly transmissible, and virulent human respiratory illness for which there are no adequate countermeasures could initiate a global pandemic. If a pandemic disease emerges by 2025, […] it probably will first occur in an area marked by high population density and close association between humans and animals, such as many areas of China and Southeast Asia […] Slow public health response would delay the realization that a highly transmissible pathogen had emerged […] Despite limits imposed on international travel, travelers with mild symptoms or who were asymptomatic could carry the disease to other continents. Waves of new cases would occur every few months. The absence of an effective vaccine and near-universal lack of immunity would render populations vulnerable to infection.”

[To get more stories like this delivered to your inbox sign up for our newsletters]

It was not a prediction, recalls Fingar, but rather an attempt to urge policymakers to think “beyond tomorrow,” past the end of their administration, and to stimulate strategic thinking about how to reinforce positive trends and change or ameliorate negative ones. If the report and its global pandemic scenario are precise, he notes, it is because the NIC’s effort involved the best specialists within the U.S. intelligence community and engaged numerous and varied groups of non-U.S. Government experts.

Yet the United States has been unprepared for the COVID-19 pandemic and the crisis is now worsening U.S.-China tensions. To address the crisis, however, argues Fingar, both countries must cooperate in the international fora. “Let that be the way that builds towards a better bilateral relationship.”

Headshot of Thomas Fingar
Thomas Fingar is a Shorenstein APARC Fellow in the Freeman Spogli Institute for International Studies at Stanford University. From 2005 through 2008, he served as the first deputy director of national intelligence for analysis and, concurrently, as chairman of the National Intelligence Council. His forthcoming edited volume is 'Fateful Decisions: Choices That Will Shape China's Future' (Stanford University Press, May 2020).
Full Biography

Read More

BEIJING, CHINA - Workers sit near a CRH (China Railway High-speed) "bullet train" at the Beijing South Railway Station under reconstruction.
News

High-Speed Rail Holds Promise and Problems for China, Explains David M. Lampton

In a new audio interview, Lampton discusses some of the challenges, uncertainties, and decisions that loom ahead of China's Belt and Road Initiative.
cover link High-Speed Rail Holds Promise and Problems for China, Explains David M. Lampton
Quote from Thomas Fingar and Jean Oi from, "China's Challeges: Now It Gets Much Harder"
Commentary

Now It Gets Much Harder: Thomas Fingar and Jean Oi Discuss China’s Challenges in The Washington Quarterly

cover link Now It Gets Much Harder: Thomas Fingar and Jean Oi Discuss China’s Challenges in The Washington Quarterly
Adam Segal lectures at APARC
News

Technology Tensions Redefining U.S.-China Relations, Says Security Expert Adam Segal

cover link Technology Tensions Redefining U.S.-China Relations, Says Security Expert Adam Segal
All News button
1
Subtitle

In our online conversation, Fingar discusses the 2008 National Intelligence Council report he oversaw and that urged action on coronavirus pandemic preparedness, explains the U.S. initial failed response to the COVID-19 outbreak, and considers the implications of the current crisis for U.S.-China relations.

-

This is a virtual event. Please click here to register and generate a link to the talk. 
The link will be unique to you; please save it and do not share with others.

Data-intensive technologies such as AI may reshape the modern world. We propose that two features of data interact to shape innovation in data-intensive economies: first, states are key collectors and repositories of data; second, data is a non-rival input in innovation. We document the importance of state-collected data for innovation using comprehensive data on Chinese facial recognition AI firms and government contracts. Firms produce more commercial software and patents, particularly data-intensive ones, after receiving government public security contracts. Moreover, effects are largest when contracts provide more data. We then build a directed technical change model to study the state's role in three applications: autocracies demanding AI for surveillance purposes, data-driven industrial policy, and data regulation due to privacy concerns. When the degree of non-rivalry is as strong as our empirical evidence suggests, the state's collection and processing of data can shape the direction of innovation and growth of data-intensive economies.

Image
Portrait of David Yang
David Yang’s research focuses on political economy, behavioral and experimental economics, economic history, and cultural economics. In particular, David studies the forces of stability and forces of changes in authoritarian regimes, drawing lessons from historical and contemporary China. David received a B.A. in Statistics and B.S. in Business Administration from University of California at Berkeley, and PhD in Economics from Stanford. David is currently a Prize Fellow in Economics, History, and Politics at Harvard and a Postdoctoral Fellow at J-PAL at MIT. He also joined Harvard’s Economics Department as an Assistant Professor as of 2020.

Via Zoom Webinar.
Register at: https://bit.ly/2VlhaMm

David Yang Prize Fellow in Economics, History, and Politics; Department of Economics, Harvard University
Seminars
Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

In a Lawfare post earlier this year, I questioned the wisdom of referring to cyber operations as psychological operations. These campaigns are the bread and butter of U.S. Cyber Command’s operational activities. My interest in this question stemmed from two recent articles, one on NPR and one in the Washington Post. The former discussed past activities of U.S. Cyber Command and the latter discussed possible future activities. Taken together, both articles used terms such as “information warfare,” “information operations,” “psychological operations” and “influence operations” to describe these activities.

I closed that post with a promise to comment on the doctrinal and conceptual confusions within Defense Department policy regarding all of these concepts. This post makes good on that promise.

 

Read the rest at Lawfare Blog

Hero Image
All News button
1
Subscribe to Intelligence